It’s almost the end of the month…do you know what that means? It’s time for another #ITKESecurity Twitter chat! Our experts, including Kevin Beaver, Jeff Cutler and Ken Harthun will be returning on February 25th at 1 PM (EST).

And what will be the big topic? This month, our experts will be tackling disaster recovery. Here are the questions they’ll be covering during the chat.

What are some common DR oversights?

How is your organization prepared to recover applications and data in case of a major outage or natural disaster?

In your disaster recovery plan, what is your baseline time to recover?

What tools are you using to automate recovery of your applications and data?

How does DR planning tie in with information security?

To get involved in our chat, just send your questions to our experts below or send your questions via Twitter. Hope to see you there.

It’s been quite a while so it’s time for another ITKE giveaway contest! For this month’s contest, the user with the most ITKE points will receive a $100 Amazon gift card. Don’t worry, I’ll be giving weekly updates on it too.

What did the security world look like in 2014? What does it have in store for us in 2015? That’s what our experts discussed in yesterday’s #ITKESecurity Twitter chat. Come check out what they talked about.

What’s the best way to start off a new year? By having another #ITKESecurity Twitter chat! Our experts, including Kevin Beaver, Ken Harthun and Jeff Cutler, are coming back on January 20th at 12 PM (EST).

What will they be discussing? Our experts will be looking at the year it was for security in 2014 and looking ahead at 2015. Here are the questions they will be looking at during the chat:

How have you changed your data security based on the myriad breaches that occurred in 2014?

How concerned were you about your security based on the numerous data breaches in all industries last year?

Based on the security breaches of last year, do you plan to make any changes in your security model?

What is the one main step you’ve taken to deal with/prevent data incidents in the coming year?

How can we break the tiring (and costly) breach-then-react cycle moving forward?

What team(s) are tasked with responding to and rectifying any data incident within your organization?

To get involved in our chat, just send your questions to our experts below or send your questions via Twitter. See you on the 20th!

2014 has already come and gone, with plenty of great blog posts to show for it. To give 2014 a proper goodbye, here are the top community posts from the past year. Check out the stories and tell us which one was your favorite.

About This Blog

Get the most out of IT Knowledge Exchange with our helpful tips and tutorials showing how to get answers to your IT questions. Learn about the latest features, new blogs, and of course, our cool contests.